Sales Overview
53
Scenario: A Day in the Life of a Security Administrator
36. Review the currently configured policy. Is there a rule that already allows
some users remote access?
37. Locate the newly defined Access Role in the objects list, and drag it into the
Source Column of the Remote Access rule:
Figure 33 — Firewall - Policy Configured